Sciweavers

3155 search results - page 83 / 631
» How Are You Doing
Sort
View
BWCCA
2010
14 years 10 months ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee
INTERSPEECH
2010
14 years 10 months ago
Exploring recognition network representations for efficient speech inference on highly parallel platforms
The emergence of highly parallel computing platforms is enabling new trade-offs in algorithm design for automatic speech recognition. It naturally motivates the following investig...
Jike Chong, Ekaterina Gonina, Kisun You, Kurt Keut...
OSDI
2006
ACM
16 years 3 months ago
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy...
Junfeng Yang, Can Sar, Dawson R. Engler
INFOCOM
2009
IEEE
15 years 9 months ago
Surface Coverage in Wireless Sensor Networks
—Coverage is a fundamental problem in Wireless Sensor Networks (WSNs). Existing studies on this topic focus on 2D ideal plane coverage and 3D full space coverage. In many real wo...
Ming-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Li...
DAGSTUHL
2006
15 years 4 months ago
The Space of Cognitive Vision
Cognitive vision is an area that is not yet well-defined, in the sense that one can unambiguously state what issues fall under its purview and what considerations do not. Neither i...
David Vernon